Vulnerability Description
OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openssl | Openssl | < 0.9.8za |
| Redhat | Jboss Enterprise Application Platform | 5.2.0 |
| Redhat | Jboss Enterprise Web Platform | 5.2.0 |
| Redhat | Jboss Enterprise Web Server | 2.0.1 |
| Redhat | Storage | 2.1 |
| Fedoraproject | Fedora | 19 |
| Opensuse | Opensuse | 13.1 |
| Redhat | Enterprise Linux | 4 |
| Filezilla-Project | Filezilla Server | < 0.9.45 |
| Siemens | Application Processing Engine Firmware | < 2.0.2 |
| Siemens | Application Processing Engine | - |
| Siemens | Cp1543-1 Firmware | < 1.1.25 |
| Siemens | Cp1543-1 | - |
| Siemens | S7-1500 Firmware | < 1.6 |
| Siemens | S7-1500 | - |
| Siemens | Rox Firmware | < 1.16.1 |
| Siemens | Rox | - |
| Mariadb | Mariadb | >= 10.0.0, < 10.0.13 |
| Python | Python | >= 2.7.0, < 2.7.8 |
| Nodejs | Node.Js | < 0.10.29 |
Related Weaknesses (CWE)
References
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.ascThird Party Advisory
- http://ccsinjection.lepidum.co.jpThird Party Advisory
- http://dev.mysql.com/doc/relnotes/workbench/en/wb-news-6-1-7.htmlThird Party Advisory
- http://esupport.trendmicro.com/solution/en-US/1103813.aspxThird Party Advisory
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629Not Applicable
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29195Not Applicable
- http://kb.juniper.net/InfoCenter/index?page=content&id=KB29217Third Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-1053.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.htmThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.htmThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00030.htmlThird Party Advisory
- http://marc.info/?l=bugtraq&m=140266410314613&w=2Third Party Advisory
FAQ
What is CVE-2014-0224?
CVE-2014-0224 is a vulnerability with a CVSS score of 7.4 (HIGH). OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a ze...
How severe is CVE-2014-0224?
CVE-2014-0224 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-0224?
Check the references section above for vendor advisories and patch information. Affected products include: Openssl Openssl, Redhat Jboss Enterprise Application Platform, Redhat Jboss Enterprise Web Platform, Redhat Jboss Enterprise Web Server, Redhat Storage.